From 50e219039bb39e755436adad01322f3f8dde6687 Mon Sep 17 00:00:00 2001 From: Josh Soref Date: Tue, 2 Oct 2018 07:25:36 +0000 Subject: [PATCH] spelling: retrieve --- app/lib/utils.py | 8 ++++---- config_template.py | 2 +- configs/development.py | 2 +- 3 files changed, 6 insertions(+), 6 deletions(-) diff --git a/app/lib/utils.py b/app/lib/utils.py index 881fddc..95eaa9c 100644 --- a/app/lib/utils.py +++ b/app/lib/utils.py @@ -30,12 +30,12 @@ def get_idp_data(): global idp_data, idp_timestamp lifetime = timedelta(minutes=app.config['SAML_METADATA_CACHE_LIFETIME']) if idp_timestamp+lifetime < datetime.now(): - background_thread = Thread(target=retreive_idp_data) + background_thread = Thread(target=retrieve_idp_data) background_thread.start() return idp_data -def retreive_idp_data(): +def retrieve_idp_data(): global idp_data, idp_timestamp if 'SAML_IDP_SSO_BINDING' in app.config: new_idp_data = OneLogin_Saml2_IdPMetadataParser.parse_remote(app.config['SAML_METADATA_URL'], entity_id=app.config.get('SAML_IDP_ENTITY_ID', None), required_sso_binding=app.config['SAML_IDP_SSO_BINDING']) @@ -44,9 +44,9 @@ def retreive_idp_data(): if new_idp_data is not None: idp_data = new_idp_data idp_timestamp = datetime.now() - print("SAML: IDP Metadata successfully retreived from: " + app.config['SAML_METADATA_URL']) + print("SAML: IDP Metadata successfully retrieved from: " + app.config['SAML_METADATA_URL']) else: - print("SAML: IDP Metadata could not be retreived") + print("SAML: IDP Metadata could not be retrieved") if 'TIMEOUT' in app.config.keys(): diff --git a/config_template.py b/config_template.py index e16b098..2c34193 100644 --- a/config_template.py +++ b/config_template.py @@ -96,7 +96,7 @@ SAML_SP_CONTACT_MAIL = '' #Configures if SAML tokens should be encrypted. #If enabled a new app certificate will be generated on restart SAML_SIGN_REQUEST = False -#Use SAML standard logout mechanism retreived from idp metadata +#Use SAML standard logout mechanism retrieved from idp metadata #If configured false don't care about SAML session on logout. #Logout from PowerDNS-Admin only and keep SAML session authenticated. SAML_LOGOUT = False diff --git a/configs/development.py b/configs/development.py index ff7d36e..48a3884 100644 --- a/configs/development.py +++ b/configs/development.py @@ -89,7 +89,7 @@ SAML_SP_CONTACT_MAIL = '' #Configures if SAML tokens should be encrypted. #If enabled a new app certificate will be generated on restart SAML_SIGN_REQUEST = False -#Use SAML standard logout mechanism retreived from idp metadata +#Use SAML standard logout mechanism retrieved from idp metadata #If configured false don't care about SAML session on logout. #Logout from PowerDNS-Admin only and keep SAML session authenticated. SAML_LOGOUT = False